-
1061
-
1062
Detecting heavy trucks from mobile phone trajectories using image-based behavioral representations and deep learning models
Published 2025-07-01“…This work provides a robust tool for analyzing freight transport patterns, thereby supporting the development of strategies to mitigate the negative externalities of freight transportation while preserving its economic benefits.…”
Get full text
Article -
1063
The Exploitation of the Traditional Component in Restructuring Modern Food Offer in Romania
Published 2016-11-01“…Food and eating habits, together with adjacent agricultural activities have had and an important role in the development of modern society and the individual itself. …”
Get full text
Article -
1064
Potential distribution of native freshwater fish in Tabasco, Mexico
Published 2017-05-01“…The distribution patterns of the freshwater fish within Tabasco wetlands have not being yet studied at a regional scale. …”
Get full text
Article -
1065
No genetic structure detected in multiple Brazilian marine fish species
Published 2025-06-01“…Consequently, identifying evolutionarily significant genetic lineages within exploited species can benefit the development of conservation management strategies. With the absence of genetic data life history traits are sometimes assumed to be good predictors of genetic patterns in natural populations. …”
Get full text
Article -
1066
Reliability Analysis of Improved Type-II Adaptive Progressively Inverse XLindley Censored Data
Published 2025-06-01Get full text
Article -
1067
Ratings of Territories — A Tool of Complex Statistical Analysis (Information Aspect)
Published 2018-12-01“…Building ratings of territorial entities both within the countries in line with their administrative-territorial division, patterns, economic, historic, social, ethnic or religious relationships, environmental features; and also when comparing individual countries and their coalitions to date is a very urgent problem, the solution of which allows for selective estimation of the level of socio-economic, political and ecological status of the territories, as well as comparing them with the unity of the methodological approaches to the assessment of the territories, and also explore the changes over time of this state or condition while maintaining comparability of the sample data on a single ranking methodology with the set of indicators. …”
Get full text
Article -
1068
ECONOMIC SECURITY OF HIGHER EDUCATION: A SYSTEMIC APPROACH
Published 2022-05-01“…The basic features of higher education in the national security system, where an important role is given to the identiication of patterns of development of higher education. …”
Get full text
Article -
1069
Genesis of the education system in the context of the wave theory of E. Toffler
Published 2021-12-01“…Consider the features of the genesis of education in the wave theory of socio-cultural development of E. …”
Get full text
Article -
1070
INTERBLOCK ZONES IN THE CRUST OF THE SOUTHERN REGIONS OF EAST SIBERIA: TECTONOPHYSICAL INTERPRETATION OF GEOLOGICAL AND GEOPHYSICAL DATA
Published 2015-09-01“…Integrated interpretation of the data is challenging: when applied separately, the methods and techniques reveal various specific features of interblock zone that differ in the degree of heterogeneity of the internal patterns depending on conditions of their formation and development. …”
Get full text
Article -
1071
Machine learning framework for investigating nano- and micro-scale particle diffusion in colonic mucus
Published 2025-08-01“…This study presents a machine-learning-driven framework that integrates microrheological features into diffusional fingerprinting to characterize nano- and micro-scale particle diffusion patterns in mucus and assess the effect of mucus microrheology on such movements. …”
Get full text
Article -
1072
Music Similarity Detection Through Comparative Imagery Data
Published 2025-07-01“…In this paper, we present a technical solution for training music similarity detection models through the use of comparative imagery data. With the aid of feature-based analysis and data visualization, we conducted experiments to analyze how different music features may contribute to the judgment of plagiarism. …”
Get full text
Article -
1073
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
1074
Genome-Wide Identification and Expression Analysis of the G-Protein Gene Family in Barley Under Abiotic Stresses
Published 2024-12-01“…Heterotrimeric G-proteins are fundamental signal transducers highly conserved in plant species, which play crucial roles in regulating plant growth, development, and responses to abiotic stresses. Identification of G-protein members and their expression patterns in plants are essential for improving crop resilience against environmental stresses. …”
Get full text
Article -
1075
Classifying Emotionally Induced Pain Intensity Using Multimodal Physiological Signals and Subjective Ratings: A Pilot Study
Published 2025-06-01“…SC features emerged as key biomarkers, while valence and arousal offered complementary insights, supporting the development of personalized, psychologically informed pain assessment systems.…”
Get full text
Article -
1076
In vivo electrophysiology recordings and computational modeling can predict octopus arm movement
Published 2025-02-01“…This study demonstrates how real-time motor behaviors can be predicted and distinguished, contributing to the development of brain-machine interfaces. The ability to accurately model and predict complex movement patterns has broad implications for advancing technologies in robotics, neuroprosthetics, and artificial intelligence, paving the way for more sophisticated and adaptable systems.…”
Get full text
Article -
1077
Assessment of economic well-being in South Africa based on remote sensing transfer learning
Published 2025-05-01“…CNNS are trained to predict nighttime light intensity, act as proxies for economic activity, while learning to recognize environmental features. Patterns indicating economic activity and environmental conditions can be identified from daytime images alone. …”
Get full text
Article -
1078
Hierarchical Embedded System Based on FPGA for Classification of Respiratory Diseases
Published 2025-01-01“…Objectives: This research aims to design and develop a hierarchical embedded system that utilizes respiratory sound features for diagnosing COPD and other respiratory disorders. …”
Get full text
Article -
1079
Novel Technique for Backside Alignment Using Direct Laser Writing
Published 2025-02-01“…Test samples are cut from a 2 inch Si wafer, and copper features are sputtered and developed onto the topside. …”
Get full text
Article -
1080
Dynamic token encryption for preventing permission leakage in serverless architectures
Published 2025-07-01“…Moreover, the designed multi-factor token verification model integrates dynamic factors such as call chain features and behavior patterns, which can defend against various security threats. …”
Get full text
Article